The Latest in IT Security

Posts Tagged ‘attack targets’

Cybersecurity startup Aorato has published a report around the data breach suffered in 2013 by Target, which investigates some of the techniques used by the attackers to gain access to the company’s networks.

Read more ...

Cybersecurity startup Aorato has published a report around the data breach suffered in 2013 by Target, which investigates some of the techniques used by the attackers to gain access to the company’s networks.

Read more ...

Whether you’re a brick and mortar retailer like Target, an e-commerce business like eBay, or independent software vendor like Adobe, nothing can damage a brand quite like a data breach. The fallout can include reputational damage, a decline in sales, diminished company valuation, and executive firings. Now for the good news.

Read more ...


Categories

FRIDAY, APRIL 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments